Managed Services Details
Service | Proactive | Proactive + Security |
---|---|---|
Remote SupportRemote assistance when you need it. | ![]() | ![]() |
Advanced Device & Performance MonitoringMonitoring of key health and performance metrics of your devices to ensure minminal downtime and the best performance possible. | ![]() | ![]() |
Endpoint AntivirusDesktop and server virus protection that is monitored, updated, and managed by our team of experts. | ![]() | ![]() |
Patch ManagementSoftware updates that protect your infrastructure from known vulnerabilities. | ![]() | ![]() |
Proactive SupportWhen your infrastructure reports a problem, we respond to address it before it causes unnecessary downtime. | ![]() | ![]() |
Backup ManagementRest easy knowing your data is secure and ready to recover when you need it. SandStorm IT monitors backup jobs for success and corrects issues as they arrise. | ![]() | ![]() |
ReportingAn executive summary of your infrastructure health. | ![]() | ![]() |
Perimeter SecurityCutting-edge technology that protects your network from intrusions, viruses, spyware, worms, trojans, adware, keyloggers, and other dangerous applications. | Optional | ![]() |
Vulnerability Scanning & Complaince Test PreperationCompliance scanning to help prepare your infrastructure for compliance testing for regulations like PCI and HIPAA. | Optional | ![]() |
Wireless Security & ManagementWe managed your wireless network remotely to ensure the best performance and security possible. | Optional | ![]() |
Phishing CampaignsSimulated phishing attacks to help your employees recongize avoid this common attack vector. | Optional | ![]() |
Data Risk AssessmentsScanning and reporting of your computer network to look for confidental data stored where it shouldn't be. | Optional | ![]() |
Content FilteringProvides the controls required to enforce internet use policies and block access to harmful web content. | Optional | ![]() |
Managed DocumentsPowered by Sharepoint, a cloud based service that helps you share and organize documents. | Optional | ![]() |
Managed MailA comprehensive email solution designed to provide a secure, virus free, and spam free email experience. | Optional | ![]() |
Firewall Monitoring & ManagementThe most comprehensive perimeter protection possible. Complete management of your peremiter security. | ![]() |
|
Annual and Quarterly Technology ReviewsScheduled technology meetings to look at your upcoming projects, discuss end of life products, performance concerns, and technology growth. | ![]() |
|
IT Security PoliciesSecurity policies are a requirement of many regulations such as PCI and HIPAA. We will help draft and mantain a set of IT security policies for your business. | Optional | Optional |
vCIO/vCTO | Optional | Optional |
* denotes Minimum Required
Managed Services Pricing
- Focused on Specific Issues
- Flexible / Control
- Cost Effective
- Only pay for what you need
- Reporting that shows what you need to know
- Increased Productivity
- Reduced Downtime through issue avoidance
- Reduce operating costs
- Predictable Expenses
- Visibility of Potential Issues
1 to 9 - $75 per seat per month
10 to 24 - $70 per seat per month
25 or more - Call for Pricing
- Our Most Comprehensive Protection
- Enhanced Security & Compliance
- Proactive Approach to Security
- Most Efficient & Reliable IT Operation
- Visibility of Potential Issues